On 10 August, a jury of six men and six women rendered a verdict in favor of LED maker Lumileds LLC of San Jose, CA, USA, finding that a Chinese competitor stole trade secrets related to Lumileds core technology for making high-power LEDs ...
Tags: LED, LED technology
The technology of 3D 'bioprinting', the medical application of 3D printing to produce living tissue and organs, is advancing so quickly that it will spark a major ethical debate on its use by 2016, according to Gartner. At the same time, ...
Tags: 3D Printing, 3D printer
Despite the growing threat of state-sponsored cyberattacks launched from China and other countries, U.S companies should not be allowed to fight back on their own, security experts say. Such corporate counterstrikes would undermine ...
Tags: Computer Products, web surcrity
Intellectual property theft, predominantly by Chinese computer hackers, costs the US economy $300bn (£200bn) a year and must be treated as seriously as terrorism. That's according to The Commission on the Theft of American ...
The U.S. government should bar foreign companies that repeatedly steal or use stolen U.S. intellectual property from selling their products in the country, a new report recommended. About US$300 billion worth of intellectual property is ...
Tags: US, Foreign Firms, Intellectual Property
U.S. companies should be allowed to take aggressive countermeasures against hackers seeking to steal their intellectual property, contends the private Commission on the Theft of American Intellectual Property. The 100-page report, ...
Tags: IP, US, Computer Products
The chance of infection by malware from counterfeit software is three in 10 for businesses, and one in three for consumers, according to a new study commissioned by Microsoft and conducted by research firm IDC. Police prevented from ...
Tags: malware, counterfeit software, Microsoft
An average of 96% of the top 100 paid mobile apps have been hacked, a study has revealed. Android is the most susceptible platform, according to the State of Security in the App Economy report by security firm Arxan Technologies. The ...
Tags: mobile apps, iOS apps, Google Android platform, Hackers
Threat data Future of hardware-assisted security Why Intel bought McAfee Defence in isolation and containment Social media, cloud, big data and mobile apps Video: McAfee co-president Michael DeCesare on consumerisation and security The ...
Tags: hardware-assisted security, Intel, McAfee Defence, Social media, cloud
Week after week we read headlines pronouncing that China is about to overtake the U.S. and other advanced economies and become the number one global economic force. Recently there have been a number of high profile announcements that China ...
Tags: China, number one, economic, analysis
When you talk with the executives of most U.S. companies the subject often turns to the global market and the opportunities for growth that countries like China offer. However, as that conversation continues the next thing you often hear is ...
Tags: China, opportunities, Intellectual Property, theft of IP
Cabinet Office Minister Francis Maude has claimed that the UK is better able to deal with cyber threats than a year ago. On the anniversary of the inception of the UK cyber strategy,Maude,who oversees the strategy,has claimed that the UK ...
Tags: Cabinet Office Minister Maude, stronger cyber security of UK
The UK national Cyber Security Challenge has launched another competition to test the ability of amateur cyber defenders to protect a simulated government IT system. The competition is designed and run by the government's communications ...
Tags: defend, government, cyber attacks
The UK national Cyber Security Challenge has announced two new competitions to launch a risk analysis and policy development stream,looking at IP theft in mobile application development and motor racing. Cyber Security Challenge UK runs a ...
Tags: Cyber Security Challenge, UK, IP theft, Aston Martin